INFORMATION SECURITY of the DEFENSE FORCES in UKRAINE: CURRENT STATE and PROSPECTS Olha O

INFORMATION SECURITY of the DEFENSE FORCES in UKRAINE: CURRENT STATE and PROSPECTS Olha O

V. 01 - Nº 01 - Ano 2020 – Special Edition 127 INFORMATION SECURITY OF THE DEFENSE FORCES IN UKRAINE: CURRENT STATE AND PROSPECTS Olha O. Zolotar1 Mykola M. Zaitsev2 Vitalii V. Topolnitskyi3 Kostiantyn I. Bieliakov4 Ihor M. Koropatnik5 Abstract: The relevance of the article is is to identify the problems of information determined by the fact that security is protection of the defense forces in always one of the priority issues of state Ukraine, to find areas of their policy, and given the fact that the defense elimination. Formal logical, system forces are an integral part of the state’s structural, comparative legal methods security, the study of their information were used to conduct the study. It is security is necessary. The feasibility of noted that by separating the information this study is confirmed by the fact that in space and cyberspace, the legislator has the current conditions of the information complicated the legal regulation of the society development, information protection of the state’s information technologies of the Ukrainian defense space. It is noted that efforts to prevent forces need to adapt to existing threats to the information space in challenges and threats in order to ensure Lithuania and Latvia have been adequate protection of information that consolidated within the structure of the is of strategic importance to the state and Ministry of Defense. Accordingly, the is collected, summarized, stored by the authors emphasize the need for the defense forces. The purpose of the article optimization of the system of entities 1 Scientific Research Institute of Informatics and Law at the National Academy of Legal Sciences of Ukraine, Saksahanskyi Street, 110-c, Kyiv, 01032, Ukraine. E-mail: [email protected] 2 Central Research Institute of the Armed Forces of Ukraine, Povitroflotskyi Avenue, 28-b, Kyiv, 03049, Ukraine 3 National Defence University of Ukraine named after Ivan Cherniakhovskyi, Povitroflotskyi Avenue, 28, Kyiv, 03049, Ukraine. 4 Scientific Research Institute of Informatics and Law at the National Academy of Legal Sciences of Ukraine, Saksahanskyi Street, 110-c, Kyiv, 01032, Ukraine 5 Taras Shevchenko National University of Kyiv, M. Lomonosov Street, 81, Kyiv, 03189, Ukraine V. 01 - Nº 01 - Ano 2020 – Special Edition 128 responsible for the protection of the in the least developed countries (The information space, the creation of 2030 Agenda for Sustainable conditions for public-private cooperation Development, 2015). in this area, as in the case of Germany, Despite the number of benefits and the provision of these entities with associated with the proliferation of qualified employees. The results information and telecommunications obtained are important for the research, technologies, they threaten the security lawmaking and law enforcement of the state’s information space. This is activities. confirmed by the consequences of the Petya virus attacks, which have Keywords: information space, increased Ukraine’s anti-rating in cyberspace, telecommunication information security issues and have technology, global information system, caused significant damage to European state security. countries. This virus has become a kind of indicator of the status of national and Introduction international tools aimed at protecting The 2030 Agenda for the information space from existing Sustainable Development, adopted by threats. At the same time, it put on the the United Nations, recognizes that the agenda a number of important tasks, in proliferation of information and particular, consolidating the policies of communication technologies and the all states in the area of developing high- global interconnection of networks quality security standards for the create significant opportunities to information space, software for accelerate progress in all areas of human government structures, creating state life and bridge the already existing agencies responsible for the formation digital divide (Transforming our and implementation of policies in this World…, 2015). Considering this, this area. agenda calls on every state to take Information space security is a measures aimed at significantly key task for a number of authorities expanding access to information and today, including entities belonging to the communication technologies and to state’s defense forces. In Ukraine, such strive for universal access to the Internet entities include the Armed Forces of V. 01 - Nº 01 - Ano 2020 – Special Edition 129 Ukraine, but in modern conditions, even context of globalization (Reznik et al., the information and telecommunication 2020). systems of the latter are being attacked It is worth noting that, despite from sources geographically located the relevancy of the issue of information around the world. Thus, according to the space security in the socio-political Ministry of Defense of Ukraine, in 2019, discourse, many authors point that it is 52.97% of the attacks were from the understudied in the scientific literature. Russian Federation, 13.99% from China, M. Nieles, K. Dempsey, V.Ya. Pillitteri 6.50% from the United States, 5.89% define information security as the from Kazakhstan, 4.31% from Iran, protection of information and 3.87% from Israel, etc. This confirms information systems from unauthorized that the information and access, use, disclosure, disruption, telecommunication systems of the modification or destruction in order to Armed Forces of Ukraine are daily ensure confidentiality, integrity, and exposed to significant threats, while they accessibility. According to scientists, belong to the subjects responsible for the information is facts or ideas that can be state security, which is also a component presented (coded) in the form of various of information security. Accordingly, in forms of data; knowledge (e.g., data, the context of threats both to the security instructions) in any medium or form that of the information space of the state as an may be communication between the object and to the information and entities of the system (Nieles et al., telecommunication system of authorized 2017). entities, issues of strengthening the O.M. Kosohov, considering information security of the defense information security, substantiates that it forces are becoming especially relevant. is a component of Ukraine’s military Reznik, O., Olga Getmanets, O., security since there is a direct Kovalchuk, A., Nastyuk, V., dependence on the implementation of Andriichenko, N. note that financial, Ukraine’s most important interests in the information, military security and others military sphere on information threats are important and interconnected (Kosohov, 2016). It is worth paying components of which the state of attention to the opinion of E.S. Pelevina national security depends in the current who emphasizes the close relationship V. 01 - Nº 01 - Ano 2020 – Special Edition 130 between the problem of information The protection of the security and the concepts of international information space of the state against security and economic globalization. internal and external threats is usually Thus, the key need of the state today is the responsibility of specially authorized the need to create the conditions entities. In particular, according to the necessary for its functioning and Concept of Development of the Security development. At the same time, the rapid and Defense Sector of Ukraine in 2016, spread of information and ensuring information and cybersecurity telecommunication technologies and the is one of the tasks of the security and need to minimize the risks posed by them defense sector (Presidential Decree on put the world community at risk of the Decision…, 2016a). However, V.Yu. maintaining international security Bohdanovych, B.O. Vorovych and Ye.I. (Pelevina, 2017). Marko note that foreign experience, International information particularly that of the USA and Israel, security implies the protection of the shows that the security and defense global information system from terrorist, sector structure has its own information criminal and military-political threats. security system, which has the functions The discussion of this issue raised at the and tasks of identifying and neutralizing Conference on Information Community information security threats – and Development, held in South Africa information security and defense threats in May 1996, led to the adoption in 1998 (Bohdanovych et al., 2018). of the Resolution No. 53/70 At the same time, information Developments in the field of information security and cybersecurity cannot be and telecommunications in the context of considered to be the sole task of state international security at the 53rd session security and defense authorities since. As of the General Assembly of the United Alan Ho Wei Seng points out, the key Nations. The above resolution task is the close cooperation with all recognized for the first time at the actors at the national level and with the international level the possibility of the competent authorities at the international negative consequences of the spread and level on the timely exchange of use of information technologies and information on probable threats, search means (Pelevina, 2017). and optimization of areas for the V. 01 - Nº 01 - Ano 2020 – Special Edition 131 prevention of threats to information structural methods. Thus, the formal space (Seng, 2016). Moreover, logical method was used to investigate cooperation between the entities of the legal framework of information different countries, as well as the latter

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    15 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us